ENISA EICS Group - Call for Industrial IoT experts

Internet of Things is an emerging concept describing a broad ecosystem where different interrelated devices and services gather, process and exchange data with a view to dynamically adapt to the surrounding context. However, risks and threats related IoT devices and services are multiple and ever-evolving. This threat landscape is complicated and it can affect citizen’s security or health and privacy, in the worst scenario. Therefore it’s vital to develop tailored security measures to protect IoT from cyber threats.

In this regard, ENISA launch a Call for Participation to invite experts in security of Industrial implementations of Internet of Things to participate in the EICS expert group. The main objective to be pursued is to exchange viewpoints and ideas on cybersecurity threats, challenges and solutions.

Each member of the EICS group must have a proven technical background and direct engagement with one (or more) of the following areas:

• IoT with special focus on smart industry, Industry 4.0, Industrial IoT, smart logistics or manufacturing, robotics and AI.

• Supply or development of IoT hardware/software for industrial environments

• NGOs or associations involved in IoT security for industrial environment

• Academia, researchers, standardisation bodies and policy makers involved in any of the above subjects.

If you’re an expert in the field of Industrial IoT security and want to join the EICS group, you can submit your proposal on the official website.

News

Outcomes and key themes from ICT 2018 Session on Cybersecurity as key for a Digital Economy and Society

On 5 December 2018, the Digital Single Market of the European Commission sponsored a session on the topic of “Cybersecurity as key for a Digital Economy and Society”. The highly-popular session (over 90 attendees) took place on 5 December 2018 within the flagship ICT2018 Conference in Vienna, Austria.

Khalil Rouhana, Deputy Director General, EC – DG CNECT, kicked off the session with an overview of some of the most pressing issues of the day in cybersecurity: